咨询与建议

限定检索结果

文献类型

  • 4,116 篇 会议
  • 2,740 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 6,992 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,260 篇 工学
    • 3,242 篇 计算机科学与技术...
    • 2,630 篇 软件工程
    • 914 篇 信息与通信工程
    • 687 篇 控制科学与工程
    • 455 篇 电气工程
    • 453 篇 生物工程
    • 370 篇 生物医学工程(可授...
    • 368 篇 电子科学与技术(可...
    • 331 篇 机械工程
    • 267 篇 光学工程
    • 199 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 165 篇 网络空间安全
    • 144 篇 化学工程与技术
    • 143 篇 交通运输工程
  • 2,044 篇 理学
    • 1,019 篇 数学
    • 576 篇 物理学
    • 521 篇 生物学
    • 320 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 165 篇 化学
  • 1,378 篇 管理学
    • 908 篇 管理科学与工程(可...
    • 536 篇 图书情报与档案管...
    • 456 篇 工商管理
  • 423 篇 医学
    • 356 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 176 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 212 篇 法学
    • 178 篇 社会学
  • 155 篇 经济学
    • 153 篇 应用经济学
  • 129 篇 教育学
  • 89 篇 农学
  • 31 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 197 篇 machine learning
  • 193 篇 deep learning
  • 170 篇 software enginee...
  • 159 篇 computer science
  • 150 篇 artificial intel...
  • 133 篇 accuracy
  • 130 篇 feature extracti...
  • 123 篇 computational mo...
  • 104 篇 internet of thin...
  • 104 篇 software
  • 95 篇 training
  • 90 篇 information tech...
  • 87 篇 optimization
  • 87 篇 security
  • 84 篇 information syst...
  • 83 篇 predictive model...
  • 78 篇 data mining
  • 73 篇 support vector m...
  • 72 篇 testing
  • 71 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 department of co...
  • 33 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 24 篇 department of so...
  • 21 篇 faculty of engin...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 college of compu...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...
  • 17 篇 faculty of softw...
  • 16 篇 school of comput...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 jakimi abdeslam
  • 13 篇 yang jian
  • 12 篇 niyato dusit
  • 12 篇 abu sarwar zaman...

语言

  • 6,725 篇 英文
  • 216 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
6992 条 记 录,以下是251-260 订阅
排序:
Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论
"Hand Model" - A Static Sinhala Sign Language Translation Using Media-Pipe and SVM Compared with Hybrid Model of KNN, SVM and Random Forest Algorithms  5
"Hand Model" - A Static Sinhala Sign Language Translation Us...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Gedaragoda, G.H.M.S.C. Wijesinghe, W.R.S. Abeywickrama, T.R. Lokuliyana, Shashika Mahaadikara, Hansika Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
The study of sign language recognition has been a thriving area of research for nearly twenty years. SSL translation using computer vision relies on extensive training using large number of images or video sequences. ... 详细信息
来源: 评论
Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 271-307页
作者: Nahed Tawfik Heba M.Emara Walid El-Shafai Naglaa F.Soliman Abeer D.Algarni Fathi EAbd El-Samie Computers and Systems Department Electronics Research InstituteEl NozhaHuckstep Cairo12622Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical *** stands as the deadliest type of cancer and a signif... 详细信息
来源: 评论
A Transformer-Based Language Model for Sentiment Classification and Cross-Linguistic Generalization: Empowering Low-Resource African Languages
A Transformer-Based Language Model for Sentiment Classificat...
收藏 引用
2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2023
作者: Raychawdhary, Nilanjana Hughes, Nathaniel Bhattacharya, Sutanu Dozier, Gerry Seals, Cheryl D. Auburn University Computer Science and Software Engineering AuburnAL United States Auburn University at Montgomery Computer Science and Computer Information Systems MontgomeryAL United States
Sentiment analysis is a widely studied area of natural language processing (NLP), however, a lot of attention has been given to languages with higher resources, like English. By concentrating on low-resource African l... 详细信息
来源: 评论
An Application for Evaluating Proficiency and Expert Knowledge Criteria of information Technologies (IT) Workers with Using Fuzzy Analytic Hierarchy Process
An Application for Evaluating Proficiency and Expert Knowled...
收藏 引用
Intelligent and Fuzzy systems - Intelligence and Sustainable Future Proceedings of the INFUS 2023 Conference
作者: Tunç, Ali Taşdemir, Sakir Uyar, Mehmet Taha Bingöl, Veysel Can Architecht Information Systems Istanbul Turkey Computer Engineering Department Technology Faculty Selcuk University Konya Turkey
The information technologies (IT) sector has been an area of study whose significance has grown exponentially, taking into account the effects of growing technology and the importance of technology in recent years, ta... 详细信息
来源: 评论
Deep Learning-Based Audio Splicing Forgery Detection Using PVTv2 Transformer
Deep Learning-Based Audio Splicing Forgery Detection Using P...
收藏 引用
2024 Innovations in Intelligent systems and Applications Conference, ASYU 2024
作者: Kanca, Elif Gulsoy, Tolgahan Ustubioglu, Arda Ustubioglu, Beste Ayas, Selen Baykal Kablan, Elif Ulutas, Guzin Department of Software Engineering Karadeniz Technical University Trabzon Turkey Department of Management Information Systems Trabzon University Trabzon Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study  4
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer engineering, MI-STA 2024
作者: Benidris, Mrwan Elfallah, Ehab A. Omar Cheema, Marwa Aslam Alsma, Mohammed Salah Addin Kadiki, Tareq Ziad Elbarsha, Abdelfattah University of Benghazi Faculty of Information Technology Dep. of Computer Science Libya Libyan International Medical University Faculty of Information Technology Dept. of Software Engineering Libya University of Benghazi Faculty of Public Health Health Informatics Department Libya
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
Distance Matrix and Markov Chain Based Sensor Localization in WSN
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4051-4068页
作者: Omaima Bamasaq Daniyal Alghazzawi Surbhi Bhatia Pankaj Dadheech Farrukh Arslan Sudhakar Sengan Syed Hamid Hassan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Systems College of Computer Science and Information TechnologyKing Faisal UniversitySaudi Arabia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement&GramothanJaipurRajasthanIndia University of Engineering and Technology LahorePakistan Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveliTamilnaduIndia
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ... 详细信息
来源: 评论
Next Generation Memristor Reservoir Computing  3
Next Generation Memristor Reservoir Computing
收藏 引用
3rd IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural engineering, MetroXRAINE 2024
作者: Nikiruy, K. Ivanov, T. Ziegler, M. Rossetti, D. Corinto, F. Ascoli, A. Tetzlaff, R. Demirkol, A.S. Schmitt, N. Micro-and Nanoelectronic Systems Tu Ilmenau Department of Electrical Engineering and Information Technology Ilmenau Germany Turin Italy Institute of Circuits and Systems Tu Dresden Faculty of Electrical and Computer Engineering Dresden Germany
The nonlinear transformation used in reservoir computing can be effectively replaced by nonlinear vector autoregression (NVAR) for data prediction. In such a method, also known as next generation reservoir computing (... 详细信息
来源: 评论
The Future of Mobile Payments: Blockchain-Based Solutions  24
The Future of Mobile Payments: Blockchain-Based Solutions
收藏 引用
24th International Arab Conference on information Technology, ACIT 2023
作者: Obaid, Mahmoud Abumwais, Allam Hodrob, Rami Odeh, Suhail Obaid, Murad Arab American University Computer Systems Engineering Jenin Palestine Bethlehem University Software Engineering Bethlehem Palestine Cyprus International University Management Information Systems Northern Cyprus Turkey
Blockchain technology has the potential to disrupt the banking and financial sector, even if existing institutions are unable to benefit from it. Most banks are looking to use blockchain technology for smart contracts... 详细信息
来源: 评论